What is Lurking in the shadows...

Slides:



Advertisements
Similar presentations
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Advertisements

Intrusion Prevention anno 2012: Widening the IPS concept.
HQ in Israel Threat research, security operations center 24/7. In-depth understanding and insight into how cyber crime works. Over 10 million online identities.
© John Wallace Mobile and Online Banking Security John Wallace Consultant, Resources Global Professionals.
Securing Your Computer 1,2,3 The Basics Just the facts……..  In 2003, Symantec documented 2,636 new computer vulnerabilities, an average of seven per.
Primary Threats to Computer Security
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
SECURITY CHECK Protecting Your System and Yourself Source:
7 Effective Habits when using the Internet Philip O’Kane 1.
Breaking Trust On The Internet
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Mod H-1 Examples of Computer Crimes. Mod H-2 Stuxnet.
IDENTITY THEFT ARE YOU SAFE?. HOW DOES THIS HAPPEN TO ME? Internet “Security “ When using a public computer, never access any vital accounts like banking.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Viruses & Destructive Programs
Protecting Our Personal Space Security in a Virtual World.
Norman SecureSurf Protect your users when surfing the Internet.
Threats and ways you can protect your computer. There are a number of security risks that computer users face, some include; Trojans Conficker worms Key.
Alisha horsfield.  Computer virus is something that copies itself to computer software.  Virus can delete the hosts important documents which includes.
Protecting Our Personal Space Security in a Virtual World by David Hines - Information Security Officer
Are you safe? Alyssa Caputo & Niki Labella Itech 1101 Dr. Nagel.
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Virus & Anti-Virus Itthiwat Phiphopsukhawadee M.2/7 No.5 Saranpat Prasertthum M.2/7 No.17 Korakrit Laotrakul M.2/7 No.23 Pesan Kasemkitjanuwat M.2/7 No.25.
IT Security for Users By Matthew Moody.
 We all know we need to stay safe while using the Internet, but we may not know just how to do that. In the past, Internet safety was mostly about.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
CYBER CRIME.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Year 9 Autumn Assessment Computer system/Information security-Planning, Communicating, Information. By Louis Smith-Lassey 9k 9Y1.
PROTECTION ON THE INTERNET NADIA SNOW VIRUS Is a file made to do harm or criminal activity there are many types: -worms -Trojan horse -Spyware How they.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
Trojan Virus By Forbes and Mark. What is a Trojan virus Trojans are malicious programs that perform actions that have not been authorised by the user.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
INGOTs Computer Security Name: Elliot Haran. Introduction  Staying safe on the internet  Learning to deal with Cyber Bullying, Stalking and grooming.
We are here to help you… Fight something like this Brownies !
Avoiding viruses and malware A quick guide. What is malware?  A virus and malware are the same thing  Spyware  Worm  Trojan  Virus.
DEFINING A VIRUS By saad. Defining a virus A virus is a piece of code or program. A virus is loaded onto the computer and runs without your command All.
FIREWALL. The member in group 1. Bhummikorn M.2/5 No.5 2.Borwornrat Khrongsiriwat M.2/5 No.6 3. Panaphon sangobsakun M.2/5 No.20 4.Kalint Muangsornkeaw.
What is Spam? d min.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
AVAR 2004, Japan, Tokyo Today’s Threats and the Evolution of the Computer Underground Today’s Threats and the Evolution of the Computer Underground Eugene.
Don’t let them catch your computer!!!!!
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
Cybersecurity Test Review Introduction to Digital Technology.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
1 Botnets Group 28: Sean Caulfield and Fredrick Young ECE 4112 Internetwork Security Prof. Henry Owen.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
Travis DeBona COSC  What is Malicious Code  Types of Malicious Code  Who’s Behind It  How To Secure My Computer.
Viruses & Destructive Programs
Backdoor Attacks.
ISYM 540 Current Topics in Information System Management
How to scan system with norton-antivirus Norton antivirus is one of the worlds best anti-malware software developed by Symmantics corporation in 1991 as.
Module 7 Questions Prepared by Mr O Seguna next.
HOW DO I KEEP MY COMPUTER SAFE?
What are Computers? C Use this tutorial alongside the numbers coded in your workbook and answer the related questions in each section.
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
Presentation transcript:

What is Lurking in the shadows... Eran Kalige Head of Security Operation Center Erank@versafe-login.com

Who am I? Head of security Operation Center At Versafe Years of research and Development. Security expert Security and anti Fraud consultant Famous publications: Eurograbber banking Trojan HighRoller Trojan reports

Agenda Dark side of the net Cyber Crime Phishing attacks – who where and what it looks like. Trojan attacks - How are they distributed? Banking Trojans - who are they ? What do they do ? How they do it? Automatic transfers & fake balances - Inside look inside The hackers dropzones Summary

Facts and Details Any victims here?

Cyber Criminals

The Risk

Phishing – Easy & common

Phishing – Easy & common

Phishing – Protection Users Corporate Avoid clicking on links – go directly to the website. Verify the HTTPS connection (SSL) Look for fishy details Corporate Implement an Anti-phishing solution Update your Systems – Firewall , anti-spam , Anti-virus etc. Look for fishy details

Trojans

Trojans – past players NetBus or Netbus is a software program for remotely controlling a Microsoft Windows computer system over a network. It was created in 1998 and has been very controversial for its potential of being used as a backdoor. NetBus was written in Delphi by Carl-Fredrik Neikter, a Swedish programmer in March 1998. The author claimed that the program was meant to be used for pranks, not for illegally breaking into computer systems. Translated from Swedish, the name means "NetPrank". .

Trojans today Host control – VertexNet, Andromeda , Pony , Umbra and more. Banking Trojans – Zeus , Citadel , Gozi and more Bitcoin mining Trojans Espionage and country related – Stuxnet , Magdi and more. Mobile Trojans – Perkele, OmegaSPY , Zitmo/Eurograbber.

Trojans today – Host Control

Trojans today – Banking Trojans

Trojans today - How they look

Trojans today - How they look DEMO

Trojans today – Script injections Trojan Code Injection

Trojans today - Automatic transfers & fake balances

ATS – attacker's View

Trojans today -Citadel file:///C:/Users/Eran/Desktop/lecture/vids/videos_voscomptesenligne_labanquepostale_fr_13_05_23__07-16_.webm

ATS – OTP bypass

Mobile Malware

Mobile Malware

Trojans today - distribution Web sites infected with exploits. P2P share – Emule, Torrent, ... Worms in social networks, chat rooms, forums, … Emails

"“I'm scared.. What to do??? Users Avoid clicking on links from people you don’t know. Install an antivirus software and make sure to – UPDATE! Scan USBs and other resources you connect to the computer. Don’t fall for “ watch this video!”

Final words... baby it's a wild world, it's hard to get by just upon a smile...

Versafe protects you from Trojans on the End User QUESTIONS?

Eran Kalige Head of security operation center Versafe Questions... Eran Kalige Head of security operation center Versafe